Users can define policy to control traffic flow between which two components?()
第1题:
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel. Which users can be seen and what actions can be performed()
第2题:
Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()
第3题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第4题:
You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()
第5题:
Which result or results do these actions produce?()
第6题:
It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
第7题:
[Authorize(Users = )]
[Authorize(Roles = )]
[Authorize(Users = *)]
[Authorize(Roles = *)]
第8题:
the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
the user can see all the users except those in the Admin group, but can only modify the user’s own account
the user can see only the user’s own account, and cannot modify it
the user can see only the user’s own account, and can change the password only
第9题:
Multiple users can enter configuration mode and have their own private configuration.
When a user commits, only the user's changes are committed.
A message indicates which other users are in configuration mode and what portion of the configuration they are editing.
Only a single user can edit the configuration.
第10题:
The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.
The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.
The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.
The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them
第11题:
A role can be given to a maximum of 1000 users.
A user can have access to a maximum of 10 roles.
A role can have a maximum of 100 privileges contained in it.
Privileges are given to a role by using the CREATE ROLE statement.
A role is a named group of related privileges that can be granted to the user.
A user can have access to several roles, and several users can be assigned the same role.
第12题:
the companies wanted to increase profits.
more and more PCs are sold to homes.
many users don’t refer to the manual.
only technicians can solve their problems.
第13题:
Which of the following is true regarding NetWare Directory Services (NDS) configuration?()
第14题:
Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()
第15题:
You are unable to move the Unified Job Scheduler occupant from the SYSAUX tablespace to the USERS tablespace. What could be the reason?()
第16题:
You have an Exchange Server 2010 organization. You plan to provide users with the ability to schedule meetings. You need to recommend a scheduling solution that meets the following requirements: .Ensures that users can schedule conference rooms for meetings .Ensures that conference room owners can change the settings of meetings scheduled by users What should you include in the solution?()
第17题:
You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner. What should you modify?()
第18题:
Database server
NTP server
DHCP server
SQLServer
DNS server
Domain name
第19题:
the Federation Trust
the EWS virtual directory
the default sharing policy
the Organizational Relationship
第20题:
None of the SYSAUX occupants can be relocated.
The USERS tablespace is a bigfile tablespace (BFT).
The united Job Scheduler occupant cannot be relocated.
The SYSAUX occupants can be relocated to the SYSTEM tablespace only.
第21题:
+managers will be resolved as a Winbind group.
The timo and taki users can manipulate files regardless of the file system permissions.
+managers will be resolved as a Unix group.
+managers is a builtin default Samba group.
The admin users can be applied only to print shares.
第22题:
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file is
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.
第23题:
It can be used to allow the access privilege settings for users but not roles.
It can be used to allow the access privilege settings for users as well as roles.
It can be used to control the time interval for which the access privilege is available to a user.
It can be used to selectively restrict the access for each user in a database to different host computers.
It can be used to selectively restrict a user's access to different applications in a specific host computer.
第24题:
Remote users can access the tree through dial-in connections.
Mobile users do not require changing the NDS name context.
Remote users do not require a special NDS object entry.
There are no differences between mobile users and remote users.